Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 19:56

General

  • Target

    25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964.exe

  • Size

    141KB

  • MD5

    5ae42f93bb14b553f52bd15845b0992b

  • SHA1

    f390fab5e976495686e13bac55fb7c6600cb04f9

  • SHA256

    25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964

  • SHA512

    d3b9494e1d5ee9c20ca019d5e65f1fa83f3b3ee875001c3a5abf36503af4b94fc2bd8e75fae430b7c0b94d74f7e23ae3af228ee8602e7ee685d9e7ddb1ec3858

  • SSDEEP

    3072:wOXwqohogPKl0eIR8ex4z+nbZGfXIPqPy+YU2Xt+1:zngPKlP2844z+nbZGfXIC6+E9+

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Renames multiple (2027) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964.exe
    "C:\Users\Admin\AppData\Local\Temp\25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Firefx\Firefx32.exe
      "C:\Users\Admin\AppData\Local\Firefx\Firefx32.exe" C:\Users\Admin\AppData\Local\Temp\25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.sux

    Filesize

    160B

    MD5

    5b326b71d8037583d8e5089f1545d147

    SHA1

    9094b79da0269550935b5a440edd7229ce62a511

    SHA256

    ae12f342841b3e33dc82dd2da45c33809e454d7495386bda05a19549487588a6

    SHA512

    c1423eb5e81ed881175f88f3fef0b960561ffda2fa496d1abf21bec67e438ba305ffc83a802497b9ba08db2eb5a76e20fb3aa17732b61e9a3bfddcd3b145ce1b

  • C:\Users\Admin\AppData\Local\Firefx\Firefx32.exe

    Filesize

    141KB

    MD5

    5ae42f93bb14b553f52bd15845b0992b

    SHA1

    f390fab5e976495686e13bac55fb7c6600cb04f9

    SHA256

    25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964

    SHA512

    d3b9494e1d5ee9c20ca019d5e65f1fa83f3b3ee875001c3a5abf36503af4b94fc2bd8e75fae430b7c0b94d74f7e23ae3af228ee8602e7ee685d9e7ddb1ec3858

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\container.dat.sux

    Filesize

    16B

    MD5

    e5e33914546cba9e511ec3b2931d9bda

    SHA1

    e8294b9f6e00a0161fdbef75446c126fd03cb524

    SHA256

    0a329d31831bc64ddee858d5afd46235a5ea7a34d13b7a9c11c5b1ca1cbd25ac

    SHA512

    f54bd3b3fa873318cfb132cc96328ff25bf9cc57097393ced2c775797ecd3eb22c20b215edcd39737f43e0cc5a1e102d8fe17b5feb156b92fd0a48519b1fc580

  • C:\Users\Admin\Documents\SelectTrace.xlsx.sux

    Filesize

    10KB

    MD5

    abe842a09444539fec48e30a063e1ef3

    SHA1

    043764df3085a69cf74a9a6a2da75904e7cb6a34

    SHA256

    8aca605e729c1523fa15c2163a275615d12cea6670bc873d04f9d810f4bba3d1

    SHA512

    69c8275895981f0cfd258cc4d58dc0f68e4f5b3660e4d3dc06f82e3924f016233fdb948db4fbe7a622abe002e915b3bedc9fbc52f3abc6f570e34366b21df9ff

  • memory/2808-10-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-11-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-512-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-515-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-1129-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-2050-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-2053-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2872-9-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2872-12-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2872-0-0x000007FEF68FE000-0x000007FEF68FF000-memory.dmp

    Filesize

    4KB

  • memory/2872-5-0x000007FEF6640000-0x000007FEF6FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2872-1-0x0000000000450000-0x000000000045C000-memory.dmp

    Filesize

    48KB